Mar 2016 updated: Examcollection Microsoft 70-688 actual test 46-60

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-688 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-688-dumps.html


70-688 Product Description:
Exam Number/Code: 70-688 vce
Exam name: Managing and Maintaining Windows 8
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-688 Managing and Maintaining Windows 8

70-688 examcollection

Exam Code: 70-688 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Managing and Maintaining Windows 8
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-688 Exam.

2016 Mar 70-688 Study Guide Questions:

Q46. HOTSPOT  

You have a folder that you plan to share. 

You need to configure security for the shared folder to meet the following requirements: 

. Members of a security group named Group1 must be able to modify permissions of files and folders. . Members of a security group named Group2 must be able to read files and folders only. . Members of a security group named Group3 must be able to take ownership of files. 

What should you do? (To answer, select the appropriate options in the answer area.) 


Answer: 



Q47. Your company has purchased a subscription to Windows Intune. You use Windows Intune to automatically deploy Windows updates. 

You create an automatic approval rule in Windows Intune but notice that previously existing updates are not deployed. 

You need to ensure that all previously existing updates are automatically approved. 

What should you do? 

A. Run the approval rule. 

B. Edit the schedule for the automatic approval rule. 

C. Create and deploy a policy that uses the recommended settings in the Windows Intune Center Settings template. 

D. Create and deploy a custom policy in the Windows Intune Center Settings template. 

Answer: A 


Q48. You have client computers that run Windows 7 Enterprise. All users have roaming user profiles. 

You deploy several client computers that run Windows 8 Enterprise. 

Users who sign in to both the Windows 8 Enterprise computers and the Windows 7 Enterprise computers report that they no longer see their desktop background and their theme. 

You suspect that the user profiles are corrupt. 

You need to resolve the profile corruption issue. 

What should you do? 

A. Move all of the user profiles to a file server that runs Windows Server 2012, and then modify the profile path of each user account. 

B. on the Windows 7 computers, configure the Download roaming profiles on primary computers only Group Policy setting. 

C. on the Windows 8 computers, configure the Set roaming profile path for all users logging onto this computer Group Policy setting. 

D. For each user, set the msDs-PrimaryComputer attribute to use a Windows 8 computer. 

Answer: C 


Q49. Your company has Windows 8.1 client computers. All of the computers are managed by using Windows Intune. 

You need to provide a user with the ability to deploy software to the computers by using Windows Intune. The solution must minimize the number of permissions assigned to the user. 

Which role should you use? 

A. User management administrator from the Windows Intune account portal 

B. Global administrator from the Windows Intune account portal 

C. Service administrator from the Windows Intune administrator console 

D. Service administrator from the Windows Intune account portal 

Answer: C 


Q50. You support computers that run Windows 8 Enterprise and are members of a workgroup. 

Users are able to download and install any app from Windows Store. 

You need to ensure that only approved apps can be installed from Windows Store. 

What should you do? 

A. Configure a Software Restriction Policy Certificate rule. 

B. Enable Windows SmartScreen and select the Get administrator approval before running an unrecognized app from the Internet option. 

C. Configure an AppLocker Packaged app rule. 

D. Configure an AppLocker Publisher rule. 

Answer: C 


70-688 testing engine

Most up-to-date 70-688 exam topics:

Q51. Your network contains client computers that run Windows 8 Enterprise. The computers are 

members of an Active Directory domain. 

Your company purchases a subscription to Windows Intune. 

Synchronization between Active Directory and Windows Intune is not configured. 

You enroll all of the computers in Windows Intune. 

You plan to create groups that contain the computers by using dynamic membership. 

You need to identify which criteria you can use to populate the groups dynamically. Which three criteria should you identify? (Each correct answer presents a complete solution. Choose three.) 

A. organizational unit (OU) 

B. manager 

C. security group 

D. device type 

E. domain 

Answer: A,B,C 


Q52. DRAG DROP 

You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain. 

A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. 

You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings. 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



Q53. HOTSPOT  

You have five client computers that are configured as shown in the following table. 


You verify that each computer supports the installation of the 64-bit version of Windows 8 Pro. 

You need to identify which method to use to deploy the 64-bit version of Windows 8 Pro to each computer. The solution must minimize the need to reinstall applications and to reconfigure settings. 

In the table below, identify the correct deployment method for each computer. Make only one selection in each row. Each correct selection is worth one point. 


Answer: 



Q54. You use a Windows 8.1 desktop computer and a Windows 8.1 tablet. The desktop computer is connected to the Internet by using your home network. 

You plan to travel and want to have access to the desktop computer from the tablet. 

You need to configure remote access to the file system on the desktop computer by using the Internet. 

What should you do? 

A. Configure User Experience Virtualization (UE-V). 

B. Allow Remote Assistance connections to the desktop computer. 

C. Go to the SkyDrive website and create a group named Administrators. Add your user Windows accounts for both computers to the group. 

D. Install SkyDrive for Windows on the desktop computer and select the Make files on this PC available to me on my other devices check box. 

Answer: D 


Q55. DRAG DROP 

Your company is migrating from Windows 7 to Windows 8.1. 

Before you attempt to migrate a client computer named Computer1. Computer1 fails and can no longer start Windows 7. 

You need to migrate the user profile from Computer1 to a client computer named Computer2 that runs Windows 8.1. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



70-688 free exam

Simulation 70-688 test preparation:

Q56. You have a Windows 8.1 Enterprise client computer. 

The computer uses BitLocker Drive Encryption (BitLocker) on a fixed disk that only stores data. 

You need to prevent any data from being written to the fixed disk. 

What should you do? 

A. Run the manage-bde command and specify the -lock switch. 

B. Run the manage-bde command and specify the -pause switch. 

C. Run the manage-bde command and specify the -off switch. 

D. Run the manage-bde command and specify the -on switch. 

Answer: A 


Q57. Your network contains an Active Directory domain named contoso.com. The domain contains Windows 8.1 Enterprise client computers. 

Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses. 

You need to add a third email address for each user. 

What should you do? 

A. From Windows Azure Active Directory Module for Windows PowerShell, run the Set-Mailbox cmdlet. 

B. From Active Directory Users and Computers, modify the E-mail attribute for each user. 

C. From Active Directory Domains and Trust add a UPN suffix for each user. 

D. From the Office 365 portal, modify the Users settings of each user. 

Answer: D 


Q58. HOTSPOT  

You have the disk configuration shown in the following exhibit. (Click the Exhibit button.) 


To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point. 


Answer: 



Q59. DRAG DROP 

You support Windows 8 desktop computers for a company named Contoso, Ltd. The computers are members of the Active Directory domain named contoso.com. 

Contoso works with a supplier named Fabrikam, Inc. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. The Fabrikam network includes a website that is accessible from the Contoso network. The website requires SSL and mutual authentication. 

You need to configure the computers to allow contoso.com domain users to access the website without any warning prompts. You also need to use the fewest certificates possible. 

Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 


Answer: 



Q60. HOTSPOT  

Your company has a main office and a branch office. 

You have client computers that run Windows 8 Enterprise. 

You are evaluating whether to disable IPv6 on the client computers in the sales, marketing, research, and finance departments. 

Each user in the sales department has a laptop and frequently accesses the network by using a PPTP VPN connection. 

Each user in the marketing department has a desktop computer located in the branch office. All of the marketing department computers are configured to use BranchCache. 

Each user in the research department has a desktop computer located in the main office and uses IPSec to access research servers. 

Each user in the finance department has a laptop and frequently accesses the network by using an SSTP VPN connection. 

In the table below, identify which departments require IPv6 and which departments do not require IPv6. Make only one selection in each row. Each correct selection is worth one point. 


Answer: